Future Wireless & Network Virtualization Project

Future Wireless & Network Virtualization Project

WiFi Privacy network experiment at IETF91 Date: [2015-01-13] Authors: Name Affiliation Carlos Jess Bernardos Fabio Giust Antonio de la Oliva Juan Carlos Ziga UC3M UC3M UC3M InterDigital Phone Email [email protected] [email protected] [email protected] [email protected] Notice: This document does not represent the agreed view of the IEEE 802 EC Privacy Recommendation SG. It represents only the views of the participants listed in the Authors: field above. It is offered as a basis for discussion. It is not binding on the contributor, who reserve the right to add, amend or withdraw material contained herein. Copyright policy: The contributor is familiar with the IEEE-SA Copyright Policy . Patent policy: The contributor is familiar with the IEEE-SA Patent Policy and Procedures: and . Abstract The present document reports on the trial performed at IETF91 and presents some results 1

Experiment goals Carry out a Wi-Fi MAC randomization trial/experiment at IETF91 Evaluating support of different OSes (Windows, Mac OS X and Linux) Analyzing the impact of L2 address randomization on the user experience and the network infrastructure Specially in case of L2 address collision Learn from this initial experience so we can gather further information in subsequent trials 2 Network setup A specific SSID (ietf-PrivRandMAC) was deployed on the wireless IETF Internet infrastructure Deployed on all IETF physical APs, as an additional virtual AP WPA PSK security, to avoid non participants to accidentally connect to our trial WLAN Connected via a different VLAN to the DHCP server

and Internet gateway Provides certain isolation to the rest of the infrastructure Isolated pool of IPv4 addresses 3 Trial setup Participants were asked to notify their participation to a mailing list ([email protected]) WLAN address randomization scripts developed and provided for 3 different OSes: Microsoft Windows (tested on Windows 7) Apple Mac OS X (tested on Version 10.10, alias Yosemite) GNU Linux (tested on Debian testing/unstable, Ubuntu 13.10, and Fedora 20) Use of DHCP client identifier for debugging https://www.ietf.org/registration/MeetingWiki/wiki/91privacy 4 Participants statistics Participation increased significantly throughout the week Around 3x at the end of the week (Mon-Thu)

OS distribution 6.67% 40.00% Window s 53.33% 5 DHCP logs 685 Local MACs seen during the week 631 Local MACs were seen on the trials WLAN network 125 Local MACs were also seen on regular IETF WLAN networks Based on the number of non-Local MAC seen on the trials WLAN and other metrics (e.g., # different IP addresses allocated and DHCP hostnames provided) we estimate that between 50 and 100 people participated in the trial Method for better keeping track the number of participants should be provided in the future (e.g., use of IEEE 802.1X access setup) 6 IP address assignments

542 IP addresses were assigned to Local MAC addresses 530 IP addresses assigned to a single Local MAC address E.g., because no DHCP client ID was used by the client 12 IP addresses assigned to multiple Local MAC addresses # MAC addresses for IP address 40 35 30 25 20 15 10 5 0 38 12 5 9 3 2 3 2 4

8 10 5 36 41 42 33 41 21 40 31 34 48 49 51 .2 .2 .2 .2 .2 .2 .2 .2 .2 .2 .2 .2 0 0 0 0 2 2 2 0 2 2 2 2

.2 .2 .2 .2 .2 .2 .2 .2 .2 .2 .2 .2 29 29 29 29 29 29 29 29 29 29 29 29 1 1 1 1 1 1 1 1 1 1 1 1 0. 0. 0. 0. 0. 0.

0. 0. 0. 0. 0. 0. 13 13 13 13 13 13 13 13 13 13 13 13 7 Lifetime of Local MACs Hard to estimate based on available logs Most of the Local MACs (575) never tried to renew the DHCP lease Only 56 Local MACs tried to renew the lease/obtain a new IP This might have been caused by a change of AP/WLAN network, or a suspend/wake-up, etc Impact of the OS and user behavior Max between first and last DHCP exchanges: 41

hours 51 min 41 sec Average: 4 min 46 sec 8 Next steps Prepare a wish list for network administrators of future trial experiments Logged information: we are working on potential additional logs that would help us getting more precise information Access setup: use IEEE 802.1X to easily track the participation Increased frequency poll of logs at the routers (netdisco) Decrease DHCP lease time Pros: better estimation of the lifetime of a Local MAC address Cons: harder to evaluate the number of participants (though this could be improved with a different access setup) Does a 1h lease time provide a granularity good enough? Prepare address randomization tools for more platforms/OSes, including mobile ones (e.g. Android) Make a more detailed study of collision effects under different scenarios 9

Recently Viewed Presentations

  • Renaissance Music - Swallows Charter Academy

    Renaissance Music - Swallows Charter Academy

    * Renaissance Music Renaissance means _____ Occurred from the middle 15th c. to end of 16th c. Originated in Italy "rebirth" * Renaissance - Artists Which artist painted this painting? Leonardo da Vinci, Raphael, or Michelangelo Rafael * Renaissance -...
  • Paper 1: Source Questions - HISTORY

    Paper 1: Source Questions - HISTORY

    Annotate your cartoon/ write them in your book. Is this a positive or negative source? How do we know? Which biblical figure is Briand supposed to represent? What reaction does the cartoonist want from the people attending the banquet? Why...
  • Culture - MRS. PERRINE'S HISTORY CLASS

    Culture - MRS. PERRINE'S HISTORY CLASS

    Those who didn't have any were the Novus homo. Sense that virtue and ability were inherited. Men also tended to inherit the networks of past favours, obligations, and friendships of past generations because of this. Porches of houses were decorated...
  • The Structure of Language The study of phonetics

    The Structure of Language The study of phonetics

    (Homer Imposter) *My father was the best hairy in the family. [best hairy=least bald] * NOTES All of these sentences would be ungrammatical to a native speaker in all dialects of English; i.e., there is more going on here than...
  • Chapter 16: Marine Ecosystems Oceanography 2014 Chapter 16

    Chapter 16: Marine Ecosystems Oceanography 2014 Chapter 16

    Food Chains & Webs. Food Web: all the food chains found within an ecosystem, shows all possible paths for energy to move. Food Chain: one part of a food web starting from producers ends at decomposers
  • Course 1: Computational Photography Organisers Ramesh Raskar Mitsubishi

    Course 1: Computational Photography Organisers Ramesh Raskar Mitsubishi

    He was a NASA/ASEE Research Fellow in 1994 at NASA Langley Research Center, VA. and the inaugural Kodak Visiting Professor to RMIT in Australia. He was the recipient of the Eisenhart Award for Outstanding Teaching at RIT and the 1990...
  • Emotions, Stress, and Health - scott.k12.ky.us

    Emotions, Stress, and Health - scott.k12.ky.us

    With knowledge of physiological response and emotions, does this information support James-Lange Theory? Psychologist George Homann (1966) Studied observations of 25 soldiers with severed spinal cords. Found that those with lower spine injuries reported little change in emotions. Those with...
  • Critical phenomena in complex networks - Cornell University

    Critical phenomena in complex networks - Cornell University

    Emergent phenomena on networks. Critical phenomena: an abrupt emergence of a giant connected cluster [simulation] Analogous to the effect in percolation theory (in fact it is exactly the same effect…)